Filters
Question type

Study Flashcards

In same keys are implemented for encrypting as well as decrypting the information.


A) symmetric key encryption
B) asymmetric key encryption
C) asymmetric key decryption
D) hash-based key encryption

Correct Answer

verifed

verified

A unique piece of information that is used in encryption.


A) cipher
B) plain text
C) key
D) cipher.

Correct Answer

verifed

verified

From the options below, which of them is not a threat to information security?


A) disaster
B) eavesdropping
C) information leakage
D) unchanged default password

Correct Answer

verifed

verified

IPSec provides ______________protocols for network layer


A) 7
B) 3
C) 1
D) 4

Correct Answer

verifed

verified

______________means the protection of data from modification by unknown users.


A) confidentiality
B) integrity
C) authentication
D) non-repudiation

Correct Answer

verifed

verified

If communication between 2 people is overheard by a third person without manipulation of any data, it is called as:


A) release of message content-passive attack
B) traffic analysis -passive attacks
C) release of message content- active attacks
D) traffic analysis -active attacks

Correct Answer

verifed

verified

______________is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.


A) network security
B) database security
C) information security
D) physical security

Correct Answer

verifed

verified

In layer, vulnerabilities are directly associated with physical access to networks and hardware.


A) physical
B) data-link
C) network
D) application

Correct Answer

verifed

verified

______________of information means, only authorised users are capable of accessing the information.


A) confidentiality
B) integrity
C) non-repudiation
D) availability

Correct Answer

verifed

verified

Compromising confidential information comes under ______________    


A) bug
B) threat
C) vulnerability
D) attack

Correct Answer

verifed

verified

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?


A) they help understanding hacking better
B) they are key elements to a security breach
C) they help understands security and its components better
D) they help to understand the cyber-crime better

Correct Answer

verifed

verified

C

This helps in identifying the origin of information and authentic user. This referred to here as ______________      


A) confidentiality
B) integrity
C) authenticity
D) availability

Correct Answer

verifed

verified

Data integrity gets compromised when and are taken control off.


A) access control, file deletion
B) network, file permission
C) access control, file permission
D) network, system

Correct Answer

verifed

verified

Data is used to ensure confidentiality.


A) encryption
B) locking
C) deleting
D) backup

Correct Answer

verifed

verified

Study of creating a d using encryption and decryption techniques.


A) cipher
B) cryptography
C) encryption
D) decryption

Correct Answer

verifed

verified

Transport layer Protocol consists of ______________ main components


A) 2
B) 1
C) 3
D) 4

Correct Answer

verifed

verified

If communication between 2 people is overheard by a third person without extraction of any data, it is called as:


A) release of message content-passive attack
B) traffic analysis -passive attacks
C) release of message content- active attacks
D) traffic analysis -active attacks

Correct Answer

verifed

verified

D

An attack in which the user receives unwanted amount of e- mails.


A) smurfing
B) denial of service
C) e-mail bombing
D) ping storm

Correct Answer

verifed

verified

When you use the word it means you are protecting your data from getting disclosed.


A) confidentiality
B) integrity
C) authentication
D) availability

Correct Answer

verifed

verified

A

When integrity is lacking in a security system, ______________     occurs.


A) database hacking
B) data deletion
C) data tampering
D) data leakage

Correct Answer

verifed

verified

Showing 1 - 20 of 23

Related Exams

Show Answer